共 50 条
- [41] Profiling Mobile Malware behaviour through Hybrid Malware analysis Approach 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY (IAS), 2013, : 78 - 84
- [42] Analysis of Malware Download Sites by Focusing on Time Series Variation of Malware 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 173 - 179
- [43] Review of iOS Malware Analysis 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 511 - 515
- [44] An IT2FLS-based Malware Analysis Mechanism: Malware Analysis Network in Taiwan (MiT) 2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4652 - 4657
- [45] Fractal Methods for the Representation and Analysis of Polymorphism in Malware Fractal Methods for the Representation and Analysis of Polymorphism in Malware 2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2012,
- [47] A malware analysis platform based on taint analysis 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 22 - 25
- [48] EMICS: E-mail based Malware Infected IP Collection System KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (06): : 2881 - 2894
- [49] A Forensic Analysis of Android Malware How is Malware Written and How it Could be Detected? 2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 384 - 393